Resource Leak Affecting kernel-bootwrapper package, versions *
Threat Intelligence
EPSS
0.04% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELBOOTWRAPPER-6456424
- published 17 Mar 2024
- disclosed 15 Mar 2024
Introduced: 15 Mar 2024
CVE-2021-47122 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7
kernel-bootwrapper
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-bootwrapper
package and not the kernel-bootwrapper
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
net: caif: fix memory leak in caif_device_notify
In case of caif_enroll_dev() fail, allocated link_support won't be assigned to the corresponding structure. So simply free allocated pointer in case of error
References
- https://access.redhat.com/security/cve/CVE-2021-47122
- https://git.kernel.org/stable/c/3be863c11cab725add9fef4237ed4e232c3fc3bb
- https://git.kernel.org/stable/c/4bca2034b41c15b62d47a19158bb76235fd4455d
- https://git.kernel.org/stable/c/6a0e317f61094d377335547e015dd2ff12caf893
- https://git.kernel.org/stable/c/9348c1f10932f13b299cbc8b1bd5f780751fae49
- https://git.kernel.org/stable/c/af2806345a37313f01b1c9f15e046745b8ee2daa
- https://git.kernel.org/stable/c/b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8
- https://git.kernel.org/stable/c/b53558a950a89824938e9811eddfc8efcd94e1bb
- https://git.kernel.org/stable/c/f52f4fd67264c70cd0b4ba326962ebe12d9cba94
CVSS Scores
version 3.1